Page 10 of 73 results (0.008 seconds)

CVSS: 7.5EPSS: 97%CPEs: 8EXPL: 3

Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm. Desbordamiento de búfer basado en la pila en ciertas funciones de servicio de Active Directory en LSASRV.DLL de Local Security Authority Subsystem Service (LSASS) en Microsoft Windows NT 4.0 SP6a, 2000 SP2 a SP4, XP SP1, Server 2003, NetMeeting, Windows 98, y Windows ME permite a atacantes remotos ejecutar código arbitrario mediante un paquete que causa que la función DsRolerUpgradeDownlevelServer cree entradas de depuración largas en el fichero DCPROMO.LOG, como las explotadas por el gusano Sasser. • https://www.exploit-db.com/exploits/16368 https://www.exploit-db.com/exploits/293 https://www.exploit-db.com/exploits/295 http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020069.html http://marc.info/?l=bugtraq&m=108325860431471&w=2 http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.eeye.com/html/Research/Advisories/AD20040413C.html http://www.kb.cert.org/vuls/id/753212 http://www.securityfocus.com/bid/10108 http://www.us-cert.gov/c •

CVSS: 7.5EPSS: 54%CPEs: 7EXPL: 0

Double free vulnerability in the ASN.1 library as used in Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service and possibly execute arbitrary code. Vulnerabilidad de doble liberación de memoria en la librería ASN.1 usada en Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003, permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código de su elección. • http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.kb.cert.org/vuls/id/255924 http://www.securityfocus.com/bid/10118 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com/vulnerabilities/15713 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1007 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 95%CPEs: 8EXPL: 2

Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. Desbordamiento de búfer en la implementación del protocolo Private Communications Transport (PCT) en la librería SSL de Microsoft, usada en Microsoft Windows NT 4.0 SP6a, 2000 SP2 a SP4, XP SP1, Server 2003, NetMeeting, Windows 98, y Windows ME. • https://www.exploit-db.com/exploits/275 https://www.exploit-db.com/exploits/16334 http://www.kb.cert.org/vuls/id/586540 http://www.securityfocus.com/archive/1/361836 http://www.us-cert.gov/cas/techalerts/TA04-104A.html http://xforce.iss.net/xforce/alerts/id/168 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1093 https://oval.cisecurity.org/repository/ •

CVSS: 7.5EPSS: 40%CPEs: 6EXPL: 0

Unknown vulnerability in the H.323 protocol implementation in Windows 98, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code. Vulnerabilidad desconocida en la implementación del protocolo H.323 en Microsoft Windows 98, Windows 2000, Windows XP, y Windows Server 2003 permite a atacantes remotos ejecutar código arbitrario. • http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.kb.cert.org/vuls/id/353956 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com/vulnerabilities/15710 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A907 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A946 https://oval.cisecurity.org/re •

CVSS: 7.5EPSS: 97%CPEs: 48EXPL: 5

The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack. El servicio de mensajería de Windows NT a Server 2003 no verifica adecuadamente la longitud del mensaje, lo que permite a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamiento de búfer. • https://www.exploit-db.com/exploits/385 https://www.exploit-db.com/exploits/111 https://www.exploit-db.com/exploits/135 https://www.exploit-db.com/exploits/23247 http://marc.info/?l=bugtraq&m=106666713812158&w=2 http://marc.info/?l=ntbugtraq&m=106632188709562&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/575892 http://www.securityfocus.com/bid/8826 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003 •